Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

The Big Data store components (Nodes) communicate between them. The components do not authenticate each other.

When deploying DPOD All-In-One appliance, all communication between the big data store components is done internally making the authentication between components less significant security wise.

When deploying DPOD in a distributed architecture we highly recommend restrict access to big data store components using network security components like firewall.

Encryption at Rest

...

Info

Non-Appliance Mode Only

The steps below are only applicable for DPOD non-appliance mode installation.

You may leverage the operating system (Red Hat Enterprise Linux) capabilities for handling encryption of data at rest based on , such as LUKS Disk Encryption.

The following links provide more information on that topic:

Please make sure to use XFS file system where required to match the product prerequisites.